1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
RoseWind [281]
3 years ago
9

g Create a program that prompts a user to enter a login name and password. The correct login name is Admin, and the correct pass

word is PASS. If both login name and password are correct, display Correct Loginto the console window. If the login name or password is wrong, display what is wrong to the console window. For example, wrong username, wrong password, or both. program in C
Computers and Technology
1 answer:
frutty [35]3 years ago
7 0

Answer:

Answered below.

Explanation:

//Program in Python

login_name = "Admin"

password = "PASS"

display = " "

user_login_name = input ("Enter username: ")

user_password = input("Enter your Password: ")

if user_login_name == login_name and user_password == password:

display = "Correct Login"

elif user_login_name != login_name:

display = "wrong username"

elif user_password != password:

display = "wrong password"

print(display)

You might be interested in
What is the purpose of using variables in programming?
Sedbober [7]
Variables are used to store information to be referenced and manipulated in a computer program. ... It is helpful to think of variables as containers that hold information. Their sole purpose is to label and store data in memory. This data can then be used throughout your program.
6 0
3 years ago
Copyrighted software that is distributed at no cost for a trial period is called?
Alex
Copyrighted software that is distributed at no cost for a trial period is called Shareware.
8 0
4 years ago
Suppose that we have a set of activities to schedule among a large number of lecture halls, where any activity can take place in
Burka [1]

Answer:

By Using the Greedy- Activity- Selection algorithm

Explanation:

The Greedy- Activity- Selection algorithm in this case involves

First finding a maximum size set S1, of compatible activities from S for the first lecture hall.

Then using it again to find a maximum size set S2 of compatible activities from S - S1 for the second hall.

This is repeated till all the activities are assigned.

It requires θ(n2) time in its worse .

3 0
4 years ago
14. The term used to describe an attribute that can function like a primary key is a?​
frozen [14]

Answer:

The answer to this question is given below in this explanation section.

Explanation:

In the relationship model of database  a primary key is a specific choice of a minimal set of attributes that uniquely specific a tuple in a relation.Informally  a primary key is which attribute and in simple cases are simple a single attribute.More  formally a primary key is a choice of candidate key any other candidate key is an alternate key.

A primary key may consists of real word observable in which way it is called natural key,while an attribute created to function as a key and not use for identification outside the database is called a surrogate key.For example for a database of people time and location of birth could be a natural key.National identification number is another example of an attribute that may be used as an natural key.

8 0
3 years ago
If you get your foot stuck in a cloud how many colors can you smell with you ears
suter [353]

Answer: 42 is the answer to everything and just remember, Don,t panic.

For i am the hitch hikers guide to the galaxy.

 

Explanation:

7 0
3 years ago
Other questions:
  • You need to design a data storage scheme for Hayseed Heaven library data system. There are several hundred thousand large data r
    8·1 answer
  • Let's say you're creating a search stream in your hootsuite dashboard, to find mentions of the phrase vacation holiday getaway.
    15·1 answer
  • A 10MB file is compressed into a 2MB file for storage. What is the compression ratio?
    6·1 answer
  • You will extend zyLab3, by adding a Player class and extending the PokemonField class. You will be working with three.java files
    13·1 answer
  • Sam needs to create a spreadsheet for his coworkers. They will need to follow across a long row of data. Sam would like to make
    8·2 answers
  • How do i get the schools admin password for the good wifi
    10·2 answers
  • How do the steps taken by leaders of Athens reflect a turn towrd democracy
    10·1 answer
  • During the Inspect and Adapt event, how are reflection, data collection, problem solving, and identification of improvement acti
    5·1 answer
  • The input to the function/method consists of two arguments.<br><br> a. True<br> b. False
    13·1 answer
  • Why is it important to perform routine computer maintenance? It can make more room for junk files and downloadable programs. It
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!